{"id":"https://openalex.org/W2930840275","doi":"https://doi.org/10.1109/access.2019.2908499","title":"Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems","display_name":"Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2930840275","doi":"https://doi.org/10.1109/access.2019.2908499","mag":"2930840275"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2908499","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2908499","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08678626.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08678626.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036711558","display_name":"Km. Renuka","orcid":"https://orcid.org/0000-0003-0089-0560"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"K. M. Renuka","raw_affiliation_strings":["Chaudhary Charan Singh University, Meerut, Uttar Pradesh, IN"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Chaudhary Charan Singh University, Meerut, Uttar Pradesh, IN","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056889098","display_name":"Saru Kumari","orcid":"https://orcid.org/0000-0003-4929-5383"},"institutions":[{"id":"https://openalex.org/I303593345","display_name":"Chaudhary Charan Singh University","ror":"https://ror.org/01hzdv945","country_code":"IN","type":"education","lineage":["https://openalex.org/I303593345"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Saru Kumari","raw_affiliation_strings":["Department of Mathematics, Chaudhary Charan Singh University, Meerut, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Chaudhary Charan Singh University, Meerut, India","institution_ids":["https://openalex.org/I303593345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100643329","display_name":"Dongning Zhao","orcid":"https://orcid.org/0000-0001-9008-1438"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dongning Zhao","raw_affiliation_strings":["Shenzhen Vetose Technology Co. Ltd., Shenzhen, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Shenzhen Vetose Technology Co. Ltd., Shenzhen, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042123363","display_name":"Li Li","orcid":"https://orcid.org/0000-0003-2520-9583"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["Shenzhen Institute of Information Technology, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0003-2520-9583","affiliations":[{"raw_affiliation_string":"Shenzhen Institute of Information Technology, Shenzhen, China","institution_ids":["https://openalex.org/I158809036"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036711558"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":5.575,"has_fulltext":true,"cited_by_count":55,"citation_normalized_percentile":{"value":0.96202867,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"51014","last_page":"51027"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.806390106678009},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6513691544532776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5631639957427979},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5583310127258301},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4639522433280945},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4424760341644287},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.43659037351608276}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.806390106678009},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6513691544532776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5631639957427979},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5583310127258301},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4639522433280945},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4424760341644287},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.43659037351608276}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2908499","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2908499","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08678626.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:690ee25ecc3a4557997dd94e12b4c504","is_oa":true,"landing_page_url":"https://doaj.org/article/690ee25ecc3a4557997dd94e12b4c504","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 51014-51027 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2908499","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2908499","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08678626.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2930840275.pdf","grobid_xml":"https://content.openalex.org/works/W2930840275.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W210960402","https://openalex.org/W1541189775","https://openalex.org/W1579973638","https://openalex.org/W1905177991","https://openalex.org/W1958182583","https://openalex.org/W2005426585","https://openalex.org/W2039432955","https://openalex.org/W2081523497","https://openalex.org/W2097422349","https://openalex.org/W2123990969","https://openalex.org/W2129416474","https://openalex.org/W2175661655","https://openalex.org/W2230980570","https://openalex.org/W2404068778","https://openalex.org/W2528101580","https://openalex.org/W2605204252","https://openalex.org/W2906896490","https://openalex.org/W6634841806","https://openalex.org/W6689486409"],"related_works":["https://openalex.org/W2093798919","https://openalex.org/W3101929529","https://openalex.org/W2907262898","https://openalex.org/W2393298610","https://openalex.org/W2050433615","https://openalex.org/W2784017372","https://openalex.org/W2034419863","https://openalex.org/W3022695109","https://openalex.org/W2363363251","https://openalex.org/W2054202867"],"abstract_inverted_index":{"The":[0,62,94,123,144],"Internet":[1],"of":[2,37,41,68,109,113,120,125,139,177,249,266,277],"Things":[3],"(IoT)":[4],"forms":[5],"a":[6,39,55,82,89,261],"foundation":[7],"for":[8,19,85,233,263],"cyber-physical":[9,26],"systems.":[10,27],"We":[11,245,273],"propose":[12],"an":[13,71],"efficient":[14,92],"and":[15,30,48,79,91,104,131,173,224,243,269,281],"secure":[16,90],"authentication":[17,95,112,127,205,267],"scheme":[18,64,146,230,252,280],"machine-to-machine":[20],"(M2M)":[21],"networks":[22],"in":[23,54,70,88,169,180,197,239],"IoT":[24],"enabled":[25],"Smart":[28],"objects":[29],"smart":[31],"devices":[32,116],"over":[33],"CPS":[34],"are":[35,237],"capable":[36],"capturing":[38],"variety":[40],"multimedia":[42],"contents;":[43],"interact":[44],"with":[45,50,193,283],"each":[46,77],"other":[47,78],"also":[49,270],"the":[51,100,107,111,118,121,126,134,137,148,159,170,178,181,188,198,201,204,229,247,250,264,275,278],"physical":[52],"world":[53],"fully":[56],"automatic":[57],"manner":[58],"without":[59],"human":[60],"interference.":[61],"proposed":[63,145,202,251,279,286],"allows":[65,187],"any":[66,176,194,211],"pair":[67],"entities":[69],"M2M":[72,101,141,160,171],"network":[73,172],"to":[74,151,175,191],"mutually":[75],"authenticate":[76,174,192],"agree":[80],"on":[81,133,210],"session":[83],"key":[84,156,213,226],"communicating":[86],"data":[87],"way.":[93],"process":[96,128,206],"does":[97,207],"not":[98,208],"incorporate":[99],"service":[102,142,161],"provider,":[103,162],"hence":[105],"eliminates":[106],"burden":[108,124],"managing":[110],"massive":[114],"scale":[115],"at":[117],"edge":[119],"network.":[122],"is":[129,217,231,257],"offloaded":[130],"distributed":[132],"gateways":[135,179],"under":[136],"authority":[138],"this":[140,184],"provider.":[143],"requires":[147],"mobile":[149,189],"user":[150,190],"hold":[152],"only":[153],"one":[154],"secret":[155],"provided":[157],"by":[158,163],"which,":[164],"he":[165],"can":[166],"roam":[167],"randomly":[168],"domain.":[182,199],"Then,":[183],"authenticated":[185],"gateway":[186],"sensor":[195],"node":[196],"In":[200],"scheme,":[203],"rely":[209],"public":[212],"cryptographic":[214],"operations.":[215],"Authentication":[216],"achieved":[218],"using":[219,253,271],"very":[220],"few":[221],"hash":[222],"invocations":[223],"symmetric":[225],"encryptions.":[227],"Therefore,":[228],"suitable":[232],"environmental":[234],"sensors":[235],"which":[236,256],"limited":[238],"resources":[240],"(computation,":[241],"storage,":[242],"energy).":[244],"analyze":[246],"security":[248],"BAN":[254],"logic,":[255],"widely":[258],"accepted":[259],"as":[260],"framework":[262],"assessment":[265],"protocols":[268],"ProVerif.":[272],"assess":[274],"efficiency":[276],"compare":[282],"some":[284],"recently":[285],"schemes.":[287]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
